1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
10

100 POINTS!

Computers and Technology
2 answers:
MrRa [10]3 years ago
7 0

Your answer is B: Invention

Studentka2010 [4]3 years ago
3 0

Answer:

invention

Explanation:

becuase thats what it means

You might be interested in
Daisy, an HR executive at Matrix-Solutions, was given the responsibility to conduct induction training for the newly hired emplo
sasho [114]

Answer:

The answer is Presentation Software.

Explanation:

The application that best suits her purpose is a Presentation Software. Such as: powerpoint, google presentations, keynote,  OpenOffice Impress, Media Shout, Harvard Graphics, Adobe Persuasion.

These are excellent tools for Daisy's purpose.

8 0
3 years ago
Write a small program that takes in two numbers from the user. Using an if statement and an else statement, compare them and tel
kap26 [50]

What code is it java, HTML,C++ or lua?  be specific.

4 0
3 years ago
Read 2 more answers
In what type of attack does the adversary leverage a position on a guest operating system to gain access to hardware resources a
il63 [147K]

Answer:

VM escape attack

Explanation:

<em>In a VM escape attack, the attacker exploits hypervisor vulnerabilities to gain control over resources reserved for other guest operating systems. Services operating on the guest may be exposed to the other attacks, but such attacks can only access data allotted to the same guest. In the event of a buffer overflow or directory traversal or the client in the case of cross-site scripting.</em>

6 0
2 years ago
Computers use two different types of memory to operate.
Julli [10]
I only know one which is GB. This is used to store data lie files, software updates, pictures and that kind of thing.
4 0
4 years ago
Read 2 more answers
What will be the output of the following program? Assume the user responds with a 5.
FrozenT [24]

The output will be: You owe $ 15.0

4 0
4 years ago
Other questions:
  • Explain where and why metallic material or non metallic material have been used in your home​
    8·1 answer
  • Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping h
    9·1 answer
  • What does it mean when your phone says system ui has stopped?
    7·1 answer
  • Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the ap
    14·1 answer
  • Pls help!!!!!!!!!!!!
    13·2 answers
  • Will Give Brainliest
    10·1 answer
  • State the domain and range for the following relation. Then determine whether the relation represents a function. A box labeled
    6·1 answer
  • Using robots to replace workers in factories is an example of which of the following forms of information processing systems? a.
    5·1 answer
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion
    13·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!